diff options
author | Andrew G. Morgan <morgan@kernel.org> | 2021-05-04 20:28:37 -0700 |
---|---|---|
committer | Andrew G. Morgan <morgan@kernel.org> | 2021-05-07 20:06:36 -0700 |
commit | fe4c27de243b13973acff3cda2c8c8ff4a768855 (patch) | |
tree | 0f117b5def631a8df86eb66d2d797c579159ae62 /progs | |
parent | b08b523364b133d7e158968892eba48a18827142 (diff) | |
download | libcap2-fe4c27de243b13973acff3cda2c8c8ff4a768855.tar.gz |
Add a module argument to pam_cap.so to assist with ambient support
Some PAM applications drop privilege when they change UID, which has
the side effect of dropping ambient capabilities. We add support for
the "keepcaps" argument which can be used in an attempt by the module
to not drop permitted capabilities when performing a setuid() call.
Some experimentation may be needed to see if this works for any given
application. To not be a security bug vector, it requires the application
so configured perform an exec() to launch a user-specific operation.
This is an attempt to provide some Adminstrator support for working
around the issue observed in this bug (report by Zoltan Fridrich):
https://bugzilla.kernel.org/show_bug.cgi?id=212945
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
Diffstat (limited to 'progs')
0 files changed, 0 insertions, 0 deletions